vulnerability
Amazon Linux AMI 2: CVE-2021-36374: Security patch for ant (ALAS-2022-1880)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | 07/14/2021 | 12/07/2022 | 12/07/2022 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
07/14/2021
Added
12/07/2022
Modified
12/07/2022
Description
When reading a specially crafted ZIP archive, or a derived formats, an Apache Ant build can be made to allocate large amounts of memory that leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Commonly used derived formats from ZIP archives are for instance JAR files and many office files. Apache Ant prior to 1.9.16 and 1.10.11 were affected.
Solution(s)
amazon-linux-ami-2-upgrade-antamazon-linux-ami-2-upgrade-ant-antlramazon-linux-ami-2-upgrade-ant-apache-bcelamazon-linux-ami-2-upgrade-ant-apache-bsfamazon-linux-ami-2-upgrade-ant-apache-log4jamazon-linux-ami-2-upgrade-ant-apache-oroamazon-linux-ami-2-upgrade-ant-apache-regexpamazon-linux-ami-2-upgrade-ant-apache-resolveramazon-linux-ami-2-upgrade-ant-apache-xalan2amazon-linux-ami-2-upgrade-ant-commons-loggingamazon-linux-ami-2-upgrade-ant-commons-netamazon-linux-ami-2-upgrade-ant-javadocamazon-linux-ami-2-upgrade-ant-javamailamazon-linux-ami-2-upgrade-ant-jdependamazon-linux-ami-2-upgrade-ant-jmfamazon-linux-ami-2-upgrade-ant-jschamazon-linux-ami-2-upgrade-ant-junitamazon-linux-ami-2-upgrade-ant-manualamazon-linux-ami-2-upgrade-ant-swingamazon-linux-ami-2-upgrade-ant-testutil

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.